Static task
static1
Behavioral task
behavioral1
Sample
498c0fc1bf61bd4044f59d167c8244328d1c56768d191b550960366ca98cb57d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
498c0fc1bf61bd4044f59d167c8244328d1c56768d191b550960366ca98cb57d.exe
Resource
win10v2004-20220901-en
General
-
Target
498c0fc1bf61bd4044f59d167c8244328d1c56768d191b550960366ca98cb57d
-
Size
98KB
-
MD5
07d462ebf8a9020338cb103cb1c74b00
-
SHA1
a2958a312bb8c94852d48a2474003ae7643f06da
-
SHA256
498c0fc1bf61bd4044f59d167c8244328d1c56768d191b550960366ca98cb57d
-
SHA512
ef52e64cd82741fbfd467e185399e244bfe59a86bff1c09942db7ad5a44414b1f3149cb194deaa01d70d1854af4bd243a56c91bbf8772641b7d692bdc94f105d
-
SSDEEP
3072:fucOUZO+GCW2N53zEIRrng9gsZ28bdxx/2xsMAMiv:9OUZO+9Xng9Vk8DoiMAMiv
Malware Config
Signatures
Files
-
498c0fc1bf61bd4044f59d167c8244328d1c56768d191b550960366ca98cb57d.exe windows x86
5ba2ebc89cf64d3613eb709819f75809
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
TerminateProcess
CloseHandle
GetFileAttributesA
CreateToolhelp32Snapshot
Process32First
WritePrivateProfileStringA
GetPrivateProfileStringA
OutputDebugStringA
Process32Next
CreateDirectoryA
GetModuleFileNameA
CreateFileA
SetFilePointer
WriteFile
VirtualFree
FileTimeToSystemTime
VirtualAlloc
ReadFile
FlushInstructionCache
SetEndOfFile
GetCurrentProcess
GetProcessTimes
FileTimeToLocalFileTime
GetModuleHandleA
GetPrivateProfileIntA
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
user32
DispatchMessageA
TranslateMessage
GetMessageA
CallWindowProcA
GetWindowLongA
SetWindowLongA
DestroyWindow
IsWindow
MessageBoxA
CreateWindowExA
shell32
SHGetSpecialFolderPathA
msvcp80
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcr80
_acmdln
??3@YAXPAX@Z
strftime
_getpid
atol
_localtime64
_invalid_parameter_noinfo
_time64
sscanf
_snprintf
_vsnprintf_s
_mbsrchr
_access
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
memset
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
__CxxFrameHandler3
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE